Research Article
A UAV-Aided Cluster Head Election Framework and Applying Such to Security-Driven Cluster Head Election Schemes: A Survey
Table 3
Security comparison of security-driven CH election schemes.
| Category of security-driven CH election schemes | Unpredictability | Non-manipulability | Agreement property | Immunity against message loss | Privacy |
| Pre-distributed key schemes | F-LEACH | Low | High | Low | Low | Low | SecLEACH | Low | High | Low | Low | Low |
| Random number schemes | Commitment-based scheme | Low | Low | Medium | Low | Low | Seed-based scheme | Low | Low | Medium | Low | Low | Merkle’s puzzle based scheme | Medium | High | High | Medium | Low | Trust-based scheme | Low | High | High | High | Low |
| Key chain schemes | Dong’s scheme | Low | Low | Medium | Medium | Low | Han’s scheme | Low | Low | Low | Medium | Low |
| Cryptographic schemes | Symmetric cryptography scheme | Low | High | Low | Low | Low | Discrete logarithm scheme | High | High | Low | Low | High |
|
|